Is there an accusation that Huawei's hardware/software - as installed in other countries companies and institutions, may be allowing Chinese authorities to monitor activity/access information?

Or is it that Huawei's staff are somehow doing shady things - maybe revealing business in confidence information to the Chinese government?

From this link it suggests that it may be to do with the company's relationship with the...

Huawei]]>29AI cyber-attack threat declassifiedFri, 28 Sep 2018 04:16:13 +0000https://www.defencetalk.com/military/forums/t/ai-cyber-attack-threat-declassified.14634/
https://www.defencetalk.com/military/forums/t/ai-cyber-attack-threat-declassified.14634/invalid@example.com (robots2005 AI32080)robots2005 AI32080AI cyber-attack threat declassified]]>1How social media is being weaponisedTue, 14 Nov 2017 15:28:14 +0000https://www.defencetalk.com/military/forums/t/how-social-media-is-being-weaponised.13915/
https://www.defencetalk.com/military/forums/t/how-social-media-is-being-weaponised.13915/invalid@example.com (ngatimozart)ngatimozartWar Goes Viral - How social media is being weaponized across the world
A quite an interesting article in The Atlantic that investigates how social media is now be used in war to advance the causes of the combatants. This is not just being done by groups such as Daesh and now other non state actors, but also by state actors such as Russia, China, Venezuela and others for various reasons. Daesh have...

How social media is being weaponised]]>11Cellular Network during ConflictThu, 12 Oct 2017 13:54:12 +0000https://www.defencetalk.com/military/forums/t/cellular-network-during-conflict.14153/
https://www.defencetalk.com/military/forums/t/cellular-network-during-conflict.14153/invalid@example.com (Boer Kommando)Boer Kommando
Assuming that CT’s are maintained and fuel is available for the generators they could remain operational indefinitely without electricity.

What I would like to examine is Cellular Providers (CP’s) and state influence on CP’s, and how that influences availability to a network. More specifically, how areas outside of state control still have use of a cell network, Syria...

Cellular Network during Conflict]]>6Did WikiLeaks Sound the Death Knell of Western Tech Dominance?Fri, 24 Mar 2017 06:35:07 +0000https://www.defencetalk.com/military/forums/t/did-wikileaks-sound-the-death-knell-of-western-tech-dominance.14046/
https://www.defencetalk.com/military/forums/t/did-wikileaks-sound-the-death-knell-of-western-tech-dominance.14046/invalid@example.com (Motti)Motti
According to WikiLeaks: "Year Zero introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of ‘zero day' weaponized exploits against a wide range of...

Did WikiLeaks Sound the Death Knell of Western Tech Dominance?]]>6IP addresses in GIGSat, 19 Nov 2016 10:13:49 +0000https://www.defencetalk.com/military/forums/t/ip-addresses-in-gig.12832/
https://www.defencetalk.com/military/forums/t/ip-addresses-in-gig.12832/invalid@example.com (senmeis)senmeis
it is said that the IP protocal is also used in Global Information Grid. Can the same IP addresses be used in GIG as the outer world because it is a separated network? Or must the private IP addresses be used there?

* Fact that wikileaks has revealed cables that show the US in not a terrible light
* Hawkes views, drinking etc
* Australian internal politics.

Makes me wonder if this was perhaps an officially sanctioned...

Wikileaks reveals US-Australia relationship]]>2The Threat of the Web in Today's age - What actions can be taken?Wed, 23 Sep 2015 06:24:49 +0000https://www.defencetalk.com/military/forums/t/the-threat-of-the-web-in-todays-age-what-actions-can-be-taken.11294/
https://www.defencetalk.com/military/forums/t/the-threat-of-the-web-in-todays-age-what-actions-can-be-taken.11294/invalid@example.com (Kirkzzy)Kirkzzyarticle recently and it is about a terrorist magazine that teaches individuals how to make explosives and use AK-47s. This magazine also features an image of the Sydney Opera House. So it came to my attention that in the article it only says that the Australian government (ASIO) is moving to block those sights in Australia. Now I haven't been to...

The Threat of the Web in Today's age - What actions can be taken?]]>23Anonymous: guerrilla warfare 2.0?Sat, 04 Jul 2015 02:18:12 +0000https://www.defencetalk.com/military/forums/t/anonymous-guerrilla-warfare-2-0.11471/
https://www.defencetalk.com/military/forums/t/anonymous-guerrilla-warfare-2-0.11471/invalid@example.com (Shock)Shock
now while the group (or idea depending on who you ask) is primarily focused on activism/entertainment by hacking websites and the mobilization of people to form peaceful protests and not purely military, i see the foundations with in the group of near...

Your kettle may be spying on you.]]>3Suter system?Mon, 18 Nov 2013 19:52:54 +0000https://www.defencetalk.com/military/forums/t/suter-system.12873/
https://www.defencetalk.com/military/forums/t/suter-system.12873/invalid@example.com (senmeis)senmeis
has anyone heard of Suter system? It is the combination of electronic and network attack.The attacking signals seem to enter the system from the radar antenna, at least as far as I understand. But is it possible to infect the system from the radar antenna?

Senmeis]]>1Encryption advancesWed, 11 Sep 2013 11:36:47 +0000https://www.defencetalk.com/military/forums/t/encryption-advances.12733/
https://www.defencetalk.com/military/forums/t/encryption-advances.12733/invalid@example.com (Quiller)QuillerEncryption advances]]>2Public DNS serverThu, 13 Jun 2013 17:38:26 +0000https://www.defencetalk.com/military/forums/t/public-dns-server.12634/
https://www.defencetalk.com/military/forums/t/public-dns-server.12634/invalid@example.com (yohannn)yohannn
I am looking for list of Public DNS server which like powerful one and I find a list like that:
(Powerful means that I like to have DNS server which should be fast, reliable, high speed and always available)
But I want more, anybody has idea how can I find more?

Chinese steal plans for Australian Spy base.]]>8NATO Lock shields eventTue, 30 Apr 2013 23:54:13 +0000https://www.defencetalk.com/military/forums/t/nato-lock-shields-event.12540/
https://www.defencetalk.com/military/forums/t/nato-lock-shields-event.12540/invalid@example.com (StingrayOZ)StingrayOZNATO conducts annual cyber defence exercise - Security - Technology - News - iTnews.com.au
Small insight into what goes on in network security circles. I do somewhat agree they should have opened it up to a world wide red team to really test the setup.